KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
System : Windows NT SERVER-PC 10.0 build 26200 (Windows 11) AMD64
User : ServerPC ( 0)
PHP Version : 8.2.12
Disable Function : NONE
Directory :  C:/Windows/SysWOW64/downlevel/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : C:/Windows/SysWOW64/downlevel/api-ms-win-security-base-l1-1-0.dll
MZ����@���	�!�L�!This program cannot be run in DOS mode.

$%$�aEw�aEw�aEw���`Ew��w�`Ew��s�cEw�Ĉ�`Ew��u�`Ew�RichaEw�PEL�g�~�!&0


P��@E`I@�"�%T.text� `.data@0@�.rsrc�@@@�g�~<ll�g�~
����g�~$44��RSDS���������@��api-ms-win-security-base-l1-1-0.pdbGCTLT.rdataT.rdata$voltmdl�.rdata$zzzdbg`I.edata0@.bss@`.rsrc$01`@�.rsrc$02 ���������@��#�`(yk{s�K��g�~�g�~Raa�����!f�"i��<s���"S~��!X��	Dq�`���Fo����6b���0p��. q � � (!Y!�!�!�!8"s"�"�"�"3#\#�#�#�#+$N$v$�$�$�$#%[%�%�%�%4&r&�&�&�&&'`'�'�'(S(�(�()U)�)v��J��U���'Z���
Cl��	Bw��<U��J��5`����
$Q|��V�� R � � !F!u!�!�!"["�"�"�"%#J#w#�#�# $?$�$f$�$�$%C%|%�%�%&Z&�&�&�&'G'�'�'�'9(v(�(�(;)x)	

 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGIHJKLMNOPQRSTUVWXYZ[\]^_`api-ms-win-security-base-l1-1-0.dllAccessCheckadvapi32.AccessCheckAccessCheckAndAuditAlarmWadvapi32.AccessCheckAndAuditAlarmWAccessCheckByTypeadvapi32.AccessCheckByTypeAccessCheckByTypeAndAuditAlarmWadvapi32.AccessCheckByTypeAndAuditAlarmWAccessCheckByTypeResultListadvapi32.AccessCheckByTypeResultListAccessCheckByTypeResultListAndAuditAlarmByHandleWadvapi32.AccessCheckByTypeResultListAndAuditAlarmByHandleWAccessCheckByTypeResultListAndAuditAlarmWadvapi32.AccessCheckByTypeResultListAndAuditAlarmWAddAccessAllowedAceadvapi32.AddAccessAllowedAceAddAccessAllowedAceExadvapi32.AddAccessAllowedAceExAddAccessAllowedObjectAceadvapi32.AddAccessAllowedObjectAceAddAccessDeniedAceadvapi32.AddAccessDeniedAceAddAccessDeniedAceExadvapi32.AddAccessDeniedAceExAddAccessDeniedObjectAceadvapi32.AddAccessDeniedObjectAceAddAceadvapi32.AddAceAddAuditAccessAceadvapi32.AddAuditAccessAceAddAuditAccessAceExadvapi32.AddAuditAccessAceExAddAuditAccessObjectAceadvapi32.AddAuditAccessObjectAceAddMandatoryAceadvapi32.AddMandatoryAceAdjustTokenGroupsadvapi32.AdjustTokenGroupsAdjustTokenPrivilegesadvapi32.AdjustTokenPrivilegesAllocateAndInitializeSidadvapi32.AllocateAndInitializeSidAllocateLocallyUniqueIdadvapi32.AllocateLocallyUniqueIdAreAllAccessesGrantedadvapi32.AreAllAccessesGrantedAreAnyAccessesGrantedadvapi32.AreAnyAccessesGrantedCheckTokenMembershipadvapi32.CheckTokenMembershipConvertToAutoInheritPrivateObjectSecurityadvapi32.ConvertToAutoInheritPrivateObjectSecurityCopySidadvapi32.CopySidCreatePrivateObjectSecurityadvapi32.CreatePrivateObjectSecurityCreatePrivateObjectSecurityExadvapi32.CreatePrivateObjectSecurityExCreatePrivateObjectSecurityWithMultipleInheritanceadvapi32.CreatePrivateObjectSecurityWithMultipleInheritanceCreateRestrictedTokenadvapi32.CreateRestrictedTokenCreateWellKnownSidadvapi32.CreateWellKnownSidDeleteAceadvapi32.DeleteAceDestroyPrivateObjectSecurityadvapi32.DestroyPrivateObjectSecurityDuplicateTokenadvapi32.DuplicateTokenDuplicateTokenExadvapi32.DuplicateTokenExEqualDomainSidadvapi32.EqualDomainSidEqualPrefixSidadvapi32.EqualPrefixSidEqualSidadvapi32.EqualSidFindFirstFreeAceadvapi32.FindFirstFreeAceFreeSidadvapi32.FreeSidGetAceadvapi32.GetAceGetAclInformationadvapi32.GetAclInformationGetFileSecurityWadvapi32.GetFileSecurityWGetKernelObjectSecurityadvapi32.GetKernelObjectSecurityGetLengthSidadvapi32.GetLengthSidGetPrivateObjectSecurityadvapi32.GetPrivateObjectSecurityGetSecurityDescriptorControladvapi32.GetSecurityDescriptorControlGetSecurityDescriptorDacladvapi32.GetSecurityDescriptorDaclGetSecurityDescriptorGroupadvapi32.GetSecurityDescriptorGroupGetSecurityDescriptorLengthadvapi32.GetSecurityDescriptorLengthGetSecurityDescriptorOwneradvapi32.GetSecurityDescriptorOwnerGetSecurityDescriptorRMControladvapi32.GetSecurityDescriptorRMControlGetSecurityDescriptorSacladvapi32.GetSecurityDescriptorSaclGetSidIdentifierAuthorityadvapi32.GetSidIdentifierAuthorityGetSidLengthRequiredadvapi32.GetSidLengthRequiredGetSidSubAuthorityadvapi32.GetSidSubAuthorityGetSidSubAuthorityCountadvapi32.GetSidSubAuthorityCountGetTokenInformationadvapi32.GetTokenInformationGetWindowsAccountDomainSidadvapi32.GetWindowsAccountDomainSidImpersonateAnonymousTokenadvapi32.ImpersonateAnonymousTokenImpersonateLoggedOnUseradvapi32.ImpersonateLoggedOnUserImpersonateSelfadvapi32.ImpersonateSelfInitializeAcladvapi32.InitializeAclInitializeSecurityDescriptoradvapi32.InitializeSecurityDescriptorInitializeSidadvapi32.InitializeSidIsTokenRestrictedadvapi32.IsTokenRestrictedIsValidAcladvapi32.IsValidAclIsValidRelativeSecurityDescriptoradvapi32.IsValidRelativeSecurityDescriptorIsValidSecurityDescriptoradvapi32.IsValidSecurityDescriptorIsValidSidadvapi32.IsValidSidIsWellKnownSidadvapi32.IsWellKnownSidMakeAbsoluteSD2advapi32.MakeAbsoluteSD2MakeAbsoluteSDadvapi32.MakeAbsoluteSDMakeSelfRelativeSDadvapi32.MakeSelfRelativeSDMapGenericMaskadvapi32.MapGenericMaskObjectCloseAuditAlarmWadvapi32.ObjectCloseAuditAlarmWObjectDeleteAuditAlarmWadvapi32.ObjectDeleteAuditAlarmWObjectOpenAuditAlarmWadvapi32.ObjectOpenAuditAlarmWObjectPrivilegeAuditAlarmWadvapi32.ObjectPrivilegeAuditAlarmWPrivilegeCheckadvapi32.PrivilegeCheckPrivilegedServiceAuditAlarmWadvapi32.PrivilegedServiceAuditAlarmWQuerySecurityAccessMaskadvapi32.QuerySecurityAccessMaskRevertToSelfadvapi32.RevertToSelfSetAclInformationadvapi32.SetAclInformationSetFileSecurityWadvapi32.SetFileSecurityWSetKernelObjectSecurityadvapi32.SetKernelObjectSecuritySetPrivateObjectSecurityadvapi32.SetPrivateObjectSecuritySetPrivateObjectSecurityExadvapi32.SetPrivateObjectSecurityExSetSecurityAccessMaskadvapi32.SetSecurityAccessMaskSetSecurityDescriptorControladvapi32.SetSecurityDescriptorControlSetSecurityDescriptorDacladvapi32.SetSecurityDescriptorDaclSetSecurityDescriptorGroupadvapi32.SetSecurityDescriptorGroupSetSecurityDescriptorOwneradvapi32.SetSecurityDescriptorOwnerSetSecurityDescriptorRMControladvapi32.SetSecurityDescriptorRMControlSetSecurityDescriptorSacladvapi32.SetSecurityDescriptorSaclSetTokenInformationadvapi32.SetTokenInformation�0�	H`@�|4VS_VERSION_INFO��
�e
�e?�StringFileInfo�040904B0LCompanyNameMicrosoft CorporationHFileDescriptionApiSet Stub DLLh$FileVersion10.0.26100.1 (WinBuild.160101.0800)6InternalNameapisetstub�.LegalCopyright� Microsoft Corporation. All rights reserved.>OriginalFilenameapisetstubj%ProductNameMicrosoft� Windows� Operating System>
ProductVersion10.0.26100.1DVarFileInfo$Translation	��%0�%�	*�H��
��%�0�%|10
	`�He0\
+�7�N0L0
+�70	���010
	`�He �l�9
�j�%�Xu�x�Y� 	".�Bqw��4��
�0��0��3`�B�1_o�`0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110
231116192009Z
241114192009Z0p10	UUS10U
Washington10URedmond10U
Microsoft Corporation10UMicrosoft Windows0�"0
	*�H��
�0�
����8�`���g��ըd�����\�$�VL]�Ut�
����&���G�D�����O��C���kv��Gwj�,F6�+V����8-���5-u���u	�@�,׻��%�sJTJπ������مD�)̨��կC��	}S�B�vz��5{j�o2����_z���9�H�x��߬~ܑޢ–[���۝�+6�f}�8�cE�x�}��6[#��#����Z��ÈH�����2�u�:b?���v0�r0U%0
+�7
+0U«vd�L� �MMU5G���030EU>0<�:0810UMicrosoft Corporation10U
229879+5018250U#0��)9�ėx͐��O��|U�S0WUP0N0L�J�H�Fhttp://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl%200a+U0S0Q+0�Ehttp://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt0U�00
	*�H��
�5c�ż#���CP�ᰔ�_)��/V��tʛ�<���U@����~ȭ�.�DI/"��[Q�F�����Ui�9@q�H�@MS�fDz3X�ʐmv[p�sN2����u��X�]?:��۪�+:Cf;@��Űi���^�恁���}�4�ז��q�gz�ޒ���߯%�&�F
7��؉s�lk�7�����e�є�������,��l�P
�q;����of.p��xۍ�P�>��y(�U�w0��0���
avV0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
111019184142Z
261019185142Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20110�"0
	*�H��
�0�
�����.	����i�!�i33��T����� ��ҋ�8����-|by��J?5 p���k�6u�1ݍp��7�tF�([�`#,��G�g�Q'�r��ɹ;S5|���'�����#	o�F��n�<A�ˣ?]jM�i%(\6��C
��������['�'x0�[*	k"�S`,�hS��I�a��h	sD]}�T+�y��5]l+\μ�#�on�&�6�O�'��2;A�,���w�TN�\�e�C���mw�Z$�H��C0�?0	+�70U�)9�ėx͐��O��|U�S0	+�7
SubCA0U�0U�0�0U#0��Vˏ�\bh�=��[�Κ�0VUO0M0K�I�G�Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0�>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
	*�H��
��|qQ�y�n��9>�<Rn+?s��h�H�4M��&�1F�ay�8.Ek��(�����	��L
6fj���������@26v�Zƿ���Ӭ�h�b��TlP0X��|���N���|�sW�R!s4Z�V��	����~�����?�rS��c��=1e�������=����BА�_T���G�o�sNA�@�_�*��s�!(���s9_>�\`����	���Q�fG���=�*hw��Lb{��Ǻz�4Kbz����J7�-�W|�=ܸZ��ij�:��n�i!7ށ�ugӓW^)9��-���Es[���z��FX�^���g�l5��?$�5�
u�V��x,��Ј���ߺ~,c��#!�xl�X6+�̤��-����@�E�Ί\k>��p*
j�_G��c
2��6*pZ�BYqKW�~���!<��Ź���E��� ����ŕ�]b֠c �uw}=�E�����W�o3��w�bY~1�)0�%0��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1.0,U%Microsoft Windows Production PCA 20113`�B�1_o�`0
	`�He���0	*�H��
	1
+�70
+�710
+�70/	*�H��
	1" l���)������]��X�G�U��ZIx�
0Z
+�71L0J�$�"Microsoft Windows�"� http://www.microsoft.com/windows0
	*�H��
�S�J��q�	h�|d�Rp��������/� ����������j_�U�R�V���s�["�7X���kW�
ZwU�E��5�©�HDTu�i<D�)l�t�֝���Z��*�D���-Vws8+��\
�uu��o6��&�b�hj&im�2�O�9�����l+��fsg�u�^R�uk�o�1�aP�3�
gև)\p@k�X�������{Wv�
ڟ�gK��._��������
Z��靡��0��
+�71��0�|	*�H��
��m0�i10
	`�He0�R*�H��
	��A�=0�9
+�Y
010
	`�He ��/V���M�בt�E�j��5�n
e��SU�e�e�?e20240401000045.377Z0��Ѥ��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1%0#UMicrosoft America Operations1'0%UnShield TSS ESN:7F00-05E0-D9471%0#UMicrosoft Time-Stamp Service���0� 0��3�*|Y;���0
	*�H��
0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
231206184551Z
250305184551Z0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1%0#UMicrosoft America Operations1'0%UnShield TSS ESN:7F00-05E0-D9471%0#UMicrosoft Time-Stamp Service0�"0
	*�H��
�0�
��-S�8w;G3�_Fz�RM	���i��G�5������-K9`�%��>_M3����M������'g�`��
�A@�/ӛ(r��߯���_�����&�$�(:ݷ��
��C?�dx��nW����,�k���7&������S��b+�L�']ux=J�ofC��tQ�}�L3���Elf��������)l�r����x��@/Q��3,уj��x��SBjph׫����XB��{S�Y�Qv�m����k5 Pk5j�g.<�`�Ԫ"�6�GWjTx@�e����螳8�O̔�I.�vG�~�W5����C�W�`G�fd�|�FAw8@�}Wv6�ה-��kT��nj,:�g1����YC��,�c�;LI���$i��F&����*.m����"9��cY�
�Gr��k�)Eo�v�]��]lFq�QQ�T���FO��S�S-��)W;������
D�l�N���#邟�S����S ���x�(�w�!���I0�E0UЂ��WG/̚6FU0/ǶZ�%0U#0���]^b]����e�S5�r0_UX0V0T�R�P�Nhttp://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l+`0^0\+0�Phttp://www.microsoft.com/pkiops/certs/Microsoft%20Time-Stamp%20PCA%202010(1).crt0U�00U%�0
+0U��0
	*�H��
�8"�#�(�n1���І���tgi����ц,��~�T�sH��.ŀ��XI@��L��]�݃�r����j�/tTr��@��m|J[I;{X����=�_l/�f�+a���fc ����G�X�+��#���TN[Բ:��?���@B*�g�	�"�T���B�1<?�%�r�訾v&�q+6<�����
�xq�F��z$��e핱�l�$[S�'9J���cBJ��3X��b!f�&�zj�|;������~sZ����Zc<
���@O�/D�Ե�$7�u��F[<��1������Ơ��a�݂3�q7<D��J+�Gh?~���X%U�b���lo!��nZ.]9!~�יIAx�.�u�V�P���A�9Q���S�~!��u�m��O���ǫ��֌_�w:��\��_�	�U L`�g�֤Xzh��Jv�{���j� D|H�fnS3<�>$t3��{�+q�]:��
����cf�i��f(�Ffb�0�q0�Y�3��k��I�0
	*�H��
0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1200U)Microsoft Root Certificate Authority 20100
210930182225Z
300930183225Z0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100�"0
	*�H��
�0�
���L�r!y���$y�Ղ��ҩlNu��5W�lJ�⽹>`3�\O�f��SqZ�~JZ��6g�F#���w2��`}jR�D���Fk��v��P�D�q\Q17�
8n����&S|9azĪ�ri����6�5&dژ;�{3��[~��R���b%�j�]�S���VM�ݼ��㑏�9,Q��pi
�6-p�1�5(�㴇$��ɏ~�T��U�mh;�F��z)7���E�Fn�2��0\O,�b�͹⍈䖬J��q�[g`���=� �s}A�Fu��_4���� }~�ٞE߶r/�}_��۪~6�6L�+n�Q���s�M7t�4���G��|?Lۯ^����s=CN�39L��Bh.�QF�ѽjZas�g�^�(v�3rק ��
�co�6d�[���!]_0t���عP��a�65�G������k�\RQ]�%��Pzl�r�Rą��<�7�?x�E���^ڏ�riƮ{��>j�.����0��0	+�70#	+�7*�R�dĚ���<F5)��/�0U��]^b]����e�S5�r0\U U0S0Q+�7L�}0A0?+3http://www.microsoft.com/pkiops/Docs/Repository.htm0U%0
+0	+�7
SubCA0U�0U�0�0U#0��Vˏ�\bh�=��[�Κ�0VUO0M0K�I�G�Ehttp://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z+N0L0J+0�>http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt0
	*�H��
��U}�*��,g1$[�rK��o�\�>NGdx���=13�9��q6?�dl|�u9m�1��lѡ�"��fg:SMݘ��x�6.���V����i�	�{�jo�)�n�?Hu��m��m#T�xSu$W�ݟ�=��h�e��V����(U'�$�@���]='�@�8���)�ü�T�B�������j�BRu�6��as.,k{n?,	x鑲�[�I�t�쑀�=�J>f;O���2ٖ����t��Lro�u0�4�z�P�
X�@<�Tm�ctH,�NG-�q�d�$�smʎ	��WITd�s�[D�Z�k
��(�g($�8K�n�!TkjEG����^O���Lv�WT	�iD~|�als�
��Af=i��AI~~���;����>�1Q������{��p���(��6ںL���
�4�$5g+�
�挙��"��'B=%��tt[jў>�~�13}���{�8pDѐ�ȫ:�:b�pcSM��m��qj�U3X��pf�M0�50����Ѥ��0��10	UUS10U
Washington10URedmond10U
Microsoft Corporation1%0#UMicrosoft America Operations1'0%UnShield TSS ESN:7F00-05E0-D9471%0#UMicrosoft Time-Stamp Service�#
0+�(J*�e�жʃ)��˿i����0���~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100
	*�H��
�0"20240331165138Z20240401165138Z0t0:
+�Y
1,0*0
�0	�0�0
�d�06
+�Y
1(0&0
+�Y
�
0� �
0��0
	*�H��
�7g��%�\���`*�1�[B� ���ב��z4��|�^�*��z���~C�[łm�̹��p:��9�ӝ���5S�_����w�E���xm&�oИ�I�[n��%�DZF��IO����
8�<W)����bm<��dĒ�za?8��D6����!���7}��MB���
������_��6-˷kXX����%!ܻG�q�E�Ҝ�,N±�uy�'
��X�`��o*<f��?	H��uLz��E�89m���1�
0�	0��0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103�*|Y;���0
	`�He��J0	*�H��
	1
*�H��
	0/	*�H��
	1" X�V����	w�s��]�(�A-VߌX���i0��*�H��
	/1��0��0��0�� \���r��S���G���f��q@eK�0��0���~0|10	UUS10U
Washington10URedmond10U
Microsoft Corporation1&0$UMicrosoft Time-Stamp PCA 20103�*|Y;���0" Ҙ�H���5c�w8��3E���(:�ԉӢ<�0
	*�H��
�HԼ��-&�PZ?�㪔����֔G5�Y���H��ͽ+�!�3�fC�޵�x��o��Q �c�j�`vr��ӓ6�ǁ)C1�k�RsZcF�
�����u̮[�W�j֛/x�n��{d�:�+~�&��<Qx�G��)��OH���D��΅�T��吇ct�`˺F]��i־S��!i�5��s�}�K{�
	��I�S�-��xaY�d�\�8�	����Bm���b���┯�����	7:���	�Բ��$
e;���1��VD�iq��n�?��m�l\fX���?��{}H��(ظYR��Zb_���;`�j4Y1���lTg룏D\�(�ߝ�e�dž�����Bq&]�CN|sFu8��!V��s܅�Ʃ������̖���$�����o�5 �z�ys��D@ބC��nI#U܄n�:�kd/F�����nG�+~��4N?��j<0���hC�rF���q��:�pw�xp�W��%��\�!�C�a��*��

Anon7 - 2021